Distributed Computing and Internet Technology | First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings | ISBN 9783540240754

Distributed Computing and Internet Technology

First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings

herausgegeben von R.K. Ghosh und Hrushikesha Mohanty
Mitwirkende
Herausgegeben vonR.K. Ghosh
Herausgegeben vonHrushikesha Mohanty
Buchcover Distributed Computing and Internet Technology  | EAN 9783540240754 | ISBN 3-540-24075-6 | ISBN 978-3-540-24075-4

Distributed Computing and Internet Technology

First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings

herausgegeben von R.K. Ghosh und Hrushikesha Mohanty
Mitwirkende
Herausgegeben vonR.K. Ghosh
Herausgegeben vonHrushikesha Mohanty

Inhaltsverzeichnis

  • Plenary Talk – I.
  • Taming the Dynamics of Disributed Data.
  • DISTRIBUTED COMPUTING.
  • Data in Your Space.
  • Enabling Technologies for Harnessing Information Explosion.
  • Fair Leader Election by Randomized Voting.
  • An Efficient Leader Election Algorithm for Mobile Ad Hoc Networks.
  • Distributed Balanced Tables: A New Approach.
  • Performance Evaluation of Gigabit Ethernet and SCI in a Linux Cluster.
  • Performance Evaluation of a Modified-Cyclic-Banyan Based ATM / IP Switching Fabric.
  • A Scalable and Robust QoS Architecture for WiFi P2P Networks.
  • NEC: Node Energy Based Clustering Protocol for Wireless Sensor Networks with Guaranteed Connectivity.
  • Energy Efficient Cache Invalidation in a Disconnected Mobile Environment.
  • An Efficient Data Dissemination Schemes for Location Dependent Information Services.
  • A Publish / Subscribe Based Architecture of an Alert Server to Support Prioritized and Persistent Alerts.
  • A Nested Transaction Model for LDAP Transactions.
  • Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks.
  • An Efficient Protocol for Checkpoint-Based Failure Recovery in Distributed Systems.
  • Cybersecurity: Opportunities and Challenges.
  • INTERNET TECHNOLOGY.
  • Vulnerabilities and Threats in Distributed Systems.
  • A TNATS Approach to Hidden Web Documents.
  • Querying XML Documents from a Relational Database in the Presence of DTDs.
  • SAQI: Semantics Aware Query Interface.
  • Hybrid-Chord: A Peer-to-Peer System Based on Chord.
  • A Generic and Flexible Model for Replica Consistency Management.
  • An Efficient Distributed Scheme for Source Routing Protocol in Communication Networks.
  • The Roles of Ontology and Metadata Registry for Interoperable Databases.
  • DHL: Semantically Rich Dynamic and Active Hyperlinks.
  • User-Class Based Service Acceptance Policy Using ClusterAnalysis.
  • SOFTWARE ENGINEERING.
  • Tools and Techniques for Multi-site Software Development.
  • Specifying a Mobile Computing Infrastructure and Services.
  • Generating a Prototype from a UML Model of System Requirements.
  • A Type System for an Aspect Oriented Programming Language.
  • Secure Requirements Elicitation Through Triggered Message Sequence Charts.
  • Framework for Safe Reuse of Software Binaries.
  • Supporting Partial Component Matching.
  • A Novel Approach for Dynamic Slicing of Distributed Object-Oriented Programs.
  • Pattern Semantic Link: A Reusable Pattern Representation in MDA Context.
  • Compatibility Test and Adapter Generation for Interfaces of Software Components.
  • A Modern Graphic Flowchart Layout Tool.
  • SYSTEMS SECURITY.
  • A Flexible Authorization Framework for E-Commerce.
  • Efficient Algorithms for Intrusion Detection.
  • Proxi-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection.
  • Using Schemas to Simplify Access Control for XML Documents.
  • Automatic Enforcement of Access Control Policies Among Dynamic Coalitions.
  • Implementing Consistency Checking in Correlating Attacks.
  • LSAD: Lightweight SYN Flooding Attack Detector.
  • UGSP: Secure Key Establishment Protocol for Ad-Hoc Networks.
  • Tracing Attackers with Deterministic Edge Router Marking (DERM).
  • Distributing Key Updates in Secure Dynamic Groups.
  • Succinct and Fast Accessible Data Structures for Database Damage Assessment.
  • A Secure Checkpointing Protocol for Survivable Server Design.
  • MobiCoin: Digital Cash for M-Commerce.
  • Cellular Automata: An Ideal Candidate for a Block Cipher.
  • NFD Technique for Efficient and Secured Information Hiding in Low Resolution Images.
  • WORKSHOP ON DATAMINING, SECURITY & APPLICATION.
  • Improving Feature Selection in Anomaly Intrusion Detection Using Specifications.
  • Towards Automatic Learning of Valid Services for Honeypots.